SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
MCTS
Start Test
Study First
Subjects
:
certifications
,
mcts
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. How can you use ImageX to apply a WIM Image directly to a VHD file?
ImageX utility can extract the required operating system edition directly to the attached VHD file in Windows 7.
The ICMP protocol.
It is the max size is expressed in megabytes.
WIndows Update Server
2. How do you calculate the original subnet mask of a network that was divided in to multiple networks?
It will display driver signing status
Increase the minimum size of your paging file. Windows sets the initial minimum size of the paging file equal to the amount of random access memory (RAM) installed on your computer plus 300 megabytes (MB) - and the maximum size equal to three times t
Install and run many Windows XP productivity applications directly from your Windows 7-based PC. It utilizes virtualization technology - such as Windows Virtual PC - to provide a virtual Windows XP Professional SP3 environment for Windows 7 so that o
Take the number of networks and take the square root of it. Subtract that number from the subnet mask. The result is the original mask.
3. How do you install RRAS?
From the Network Policy Access Services role in system manager.
Yes - Removable Storage Access policies within a GPO can be used to restrict user's access to devices like USB drives - CDDVD drives - Floppy Disks - Tape Drives - etc.
It can can forward requests from DHCP clients for ip addresses to a remote DHCP server.
WSUS server configuration information - Metadata describing what each update is for - and general information about clients - updates and interaction.
4. Can configure a GPO to prevent all removable storage devices?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
5. What is AH?
DNS suffix search lists
Use the DHCPv6 to obtain both IPV6 addresses and additional configuration settings.
It is the authentication header protocol and digitally sign packets but not encrypt them.
Hovering over a taskbar icon shows thumbnail of that program. Hovering over the thumbnail shows a preview of that program in full view. Aero Peek also refers to the "Show desktop" button to the far right of the new taskbar.
6. What is an example of a exceptions to rule?
Default Programs Control Panel applet
For example - you can create a rule that allows all Windows processes to run except Registry Editor (Regedit.exe).
Use the route delete command.
They are written in XML and be created using the Windows System Image Manager or a text editor like notepad.
7. What needs to be enabled for smart card logon?
Boot the computer with a WINDOWS PE disk that contains a copy of IMAGEX.
It is submitted to Microsoft for "device signing" to ensure the driver was adequately tested and will not affect the integrity of the operating system. Critical files are digitally signed so that any changes to these may be easily detected. However n
EAP authentication needs to be enabled for remote access authentication (dial up - VPN - wireless) -.
If you are logged in as an administrator you can shrink an existing partition or volume to create unallocated disk space - from which you can create a new partition or volume. You can shrink a volume even on a Basic Disk.
8. What OS can Applocker policies not be enforced?
The command used to preform an offline defrag. Example: jetpack DHCP.mdb temp.mdb
All you have to do is purchase an upgrade key from Microsoft or another authorized retailer to unlock those new features.
Enterprise and Ultimate versions. The limitation refers only to the ability to enable protection on a removable storage device. Once BitLocker To Go is added to a storage device - that device can be used normally with any version of Windows 7. It can
Windows 7 Professional.
9. What is a NAP policy?
The requesting of user authentication prior to connecting to the terminal server. This completes the user aoth before reaching the logon screen making the server more secure. This helps fight Denial of Service attacks - malicious users/software.
It is a network health policy defines the minumum level of client health required to connect to the network.
Prevents the server from performing Internet name resolution.
Command to configure the TCP/IP settings.
10. What does the max=32000 mean in 'create vdisk file = c: vhd windows 7 vhdfilename.vhd max = 32000'
Encapsulating Security payload protocol used for encryption the packets created by the AH.
EARLY CHILDHOOD - EVERYONE - EVERYONE 10+ - TEEN - MATURE - ADULTS ONLY - RATING PENDING
It is the max size is expressed in megabytes.
A .WFW file
11. What can you use the User State Migration Tools (USMT) for?
Shaking (quickly dragging back and forth) a window minimizes all other windows. Shaking it again brings them back.
A scheduled task that runs by default collecting information for the Reliability monitor. If disabled it must reenabled manually from the task scheduler mmc snapin.
Streamline and simplify user state migration during large deployments of Windows Vista and Windows 7 operating systems. USMT captures user accounts - user files - operating system settings - and application settings - and then migrates them to a new
You will be prompted to reconnect online. To disable offline mode - select it from the Tools menu.
12. Where must SSL certificates must be issued by?
The Application Identity Service
A CA users trust or they will get error messages when trying to securely access a web site. They can avoid the error by installing the CA certificate to the Trusted Root Certificate Store.
It designates an authoritative DNS server - not the soa record.
It can add a driver to an offline WIM image with the /Add-Driver option
13. What does Scanstate /EFS:COPYRAW do?
A file that is loaded when a DNS server starts up and populate the root hints.
Scan through the %WinDir%WindowsUpdate.log (ie. C:WindowsWindowsUpdate.log) file.
Migrates EFS encrypted files?
Modify the service startup to automatic and also enable the proper NAP enforcement client (DHCP - EAP - RDGATEWAY - IPSEC).Configured for manual start by default.
14. How do you add the Windows 7 VHD to the boot choices menu?
A tool for controlling the types of content that your computer can access on the Internet. After you turn on Content Advisor - only rated content that meets or exceeds your criteria can be viewed. You can adjust the settings to suit your preferences.
Delegate permission by configuring the dacl of the zone file.
Boot the computer with a WINDOWS PE disk that contains a copy of IMAGEX.
Use the BCDEDIT.EXE command
15. How do you prevent Forms Based Credentials from being saved?
IPV4 and IPV6
Yes
Disable AutoComplete in Internet Explorer
Schedule reports - monitor attempt to save unauthorized files - and generate reports instantly.
16. What are Libraries?
Boot the computer with a WINDOWS PE disk that contains a copy of IMAGEX.
Where you go to manage your documents - music - pictures - and other files. You can browse your files the same way you would in a folder - or you can view your files arranged by properties like date - type - and author. In some ways - a library is si
Only Windows Vista can be directly upgraded to Windows 7 and only if you upgrade within the same processor architecture (X86 or X84).
Use SYNC Center
17. How do you calculate the number of host addresses in a give subnet?
Used to control power settings and configure computers to default to Hibernate or Standby modes. For example - running Powercfg.exe -energy will analyze the computer for energy efficiency.
Use AD integrated zones so the clients can update to more than one DNS server.
Drop both inbound and outbound traffic
Subtract the number of bits in the mask from 32 bits (255.255.255.255). Take the result (x) and have 2 to the power of the result (2^x). Subtract that final result by 2 and that is the amount of host addresses available.
18. How do you configure DHCP to ignore clients on a particular subnet?
Cannot be in different domains
Yes - Removable Storage Access policies within a GPO can be used to restrict user's access to devices like USB drives - CDDVD drives - Floppy Disks - Tape Drives - etc.
By unbinding the DHCP protocol from the nic attached to the subnet.
Through a GPO under Application Control Policies in the Computer Security Settings Node.
19. What is BCDEdit?
Is a command-line tool for managing BCD stores. It can be used for a variety of purposes - including creating new stores - modifying existing stores - adding boot menu options - and so on. BCDEdit serves essentially the same purpose as Bootcfg.exe on
So the downstream servers can recieve its approved updates via parent server. This allows multiple points of deployment. Downstream servers also can be delegated the permission to approve their own updates
Problem Steps Recorder in the Windows 7 operating system is a feature that enables users to record their interactions with an application and provide a detailed screen-by-screen view with accompanying information including mouse clicks and keyboard i
It contains the necessary tools and documentation to evaluate and mitigate application compatibility issues before deploying Windows 7 - Windows Vista - a Windows Update - or a new version of Windows Internet Explorer in your environment.
20. When you install an application in Windows Virtual PC - Windows XP Mode - where does it automatically creates a Windows 7 Start Menu Shortcut under?
Only Windows Vista can be directly upgraded to Windows 7 and only if you upgrade within the same processor architecture (X86 or X84).
All Programs - Windows Virtual PC - Windows XP Mode Applications. To run your application directly from the Windows 7 desktop - just go to your Start menu.
Enforce IPSEC on the network
By caching reads to remote files over a slow network in the Offline Files (CSC) cache. Subsequent reads to the same file are then satisfied from the client (cache) after verifying the integrity of the cached copy.
21. Does Windows 7 does have an email client like Outlook Express or Windows Mail?
When the OS loads using MSCONFIG.EXE which is also known as the System Configuration tool.
Take the ip address and use the AND command on the calculator to AND the ip address and the subnet. NOTE: AND each octet separately. Then AND the gateway and the subnet. If the AND results are the same you are on the same subnet.
No
Send email notifications
22. What does MISEXEC.EXE do?
Install Windows Installer Packages (.MSI) files. You can script the installation.
Devices and Printers Control Panel applet has a
It is the authentication header protocol and digitally sign packets but not encrypt them.
Ping the Link Local Address (FE80 Address)
23. What does Credential Manager allows you to store?
Yes - This involves picking the user certificate of the user you are sharing the file with. If that user does not already have a preinstalled certificate - then have them logon and encrypt a file for the first time and EFS will autogenerate a new cer
Also known as root scalability mode. Allows organizations with more than 16 namespace servers use consistency mode. They poll the nearest dc every hour instead of the pdc emulator. This reduces network traffic to the pdc emulator but clients might ha
Credentials - such as user names and passwords that you use to log on to websites or other computers on a network. By storing your credentials - Windows can automatically log you on to websites or other computers. Credentials are saved in special fol
Run slmgr.vbs -ato and then open up 3389 on windows firewall using netsh.
24. What is the command to configure the preferred DNS server?
Netsh set dnsserver. Example: netsh interface ipv4 set dnsserver name="Local Area Connection" source=static address=192.168.0.100
Command line equilivant of Server Manager. You can install/remove roles and features on server 2008?
You create an answer file and place it on removable media. By default - Windows Setup will search the root directory of all removable media for an answer file called Autounattend.xml.
Hovering over a taskbar icon shows thumbnail of that program. Hovering over the thumbnail shows a preview of that program in full view. Aero Peek also refers to the "Show desktop" button to the far right of the new taskbar.
25. What do you provide to Scanstate to prevent certain system settings from being migrated?
MSCHAP2 is user/password authentication while EAP-TLS is comuter authentication via certificate or smart card.
A CONFIG.XML file
It can enable a windows feature on an offline image with the /Enable-Feature option
Use it to generate an EFS user certificate
26. How do you configure client computers to use a WSUS server as the source for Windows Update?
It lets you launch process on a remote machine via command line. Example: winrs -r:(remotehost) ipconfig /all
Modify/Create a GPO
Use the BCDEDIT.EXE command
It contains the necessary tools and documentation to evaluate and mitigate application compatibility issues before deploying Windows 7 - Windows Vista - a Windows Update - or a new version of Windows Internet Explorer in your environment.
27. What port does RDP use?
Netsh add dnsserver. Example netsh interface ipv4 add dnsserver name="Local Area Connection" 192.168.0.1 index=3
Windows 7 Ultimate.
3389
By unbinding the DHCP protocol from the nic attached to the subnet.
28. Where is ageing configured?
Ping the Link Local Address (FE80 Address)
Drop both inbound and outbound traffic
It lets you launch process on a remote machine via command line. Example: winrs -r:(remotehost) ipconfig /all
On the zone file of the DNS server in the DNS manager.
29. What do RRAS/NPS policys govern?
It governs remote access and a user must meet the conditions of at least one of the policies.
It designates an authoritative DNS server - not the soa record.
Conditional forward
It makes it easy to share your libraries and printers on a home network. You can share pictures - music - videos - documents - and printers with other people in your homegroup. The homegroup is protected with a password - and you'll always be able to
30. Where should you backup to automate System Image backups and maintain multiple images?
A tool for controlling the types of content that your computer can access on the Internet. After you turn on Content Advisor - only rated content that meets or exceeds your criteria can be viewed. You can adjust the settings to suit your preferences.
By either using WSUS management console (server side targeting) or GPO (client side targeting).
Set IE back to its default settings
A network location.
31. What protocol does Ping uses?
The ICMP protocol.
Increase the minimum size of your paging file. Windows sets the initial minimum size of the paging file equal to the amount of random access memory (RAM) installed on your computer plus 300 megabytes (MB) - and the maximum size equal to three times t
WIndows Update Server
Schedule reports - monitor attempt to save unauthorized files - and generate reports instantly.
32. If you wanted to encrypt the connection between a client PC and the WSUS server what would you use?
EARLY CHILDHOOD - EVERYONE - EVERYONE 10+ - TEEN - MATURE - ADULTS ONLY - RATING PENDING
Specify this file with both the ScanState and LoadState tools to migrate all user folders and files that resides on the root of any drive and in the Users directory. However - it does not find and migrate any application data - program files - or any
SSL
A OOBE ready and will be booted into Windows Welcome
33. What does Cipher /K do?
It is the authentication header protocol and digitally sign packets but not encrypt them.
Use it to generate an EFS user certificate
Us edit dnscmd /zoneupdatefromdns command.
Boot to a Windows 7 setup DVD and run System Restore or boot to a System Repair Disk.
34. Where are Applocker policies are configured?
A collection of logs created by computers fowarding events. Viewed on the collecting computer.
Add an AD integrated zone
Through a GPO under Application Control Policies in the Computer Security Settings Node.
ISATAP Routers within an orginization - 6TO4 routers to transverse the internet - and TEREDO to traverse a NAT devise.
35. What is System protection?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
36. How do you initiate a zone transfer?
The latest Vista Service Pack
A network policy server. It is microsofts implementation of RADIUS server and replaces the IAS (internet authentication service) from windows 2003.
A file that is loaded when a DNS server starts up and populate the root hints.
Use dnscmd /zonerefresh.
37. Where is Reliability Monitor data kept?
IN the WindowsUpdateClient log in the system log portion of event viewer.
Command to configure the TCP/IP settings.
In the registry. To bind to another computer remotly the remote registry service needs to run on the target PC.
Modifies the installation of a Windows Installer Package (.MSI) and can be invoked with MSIEXEC.EXE
38. RRAS can be configured both in ______________.
It can be used to configure an unattended install of Windows 7. The answer file is now an XML file instead of an INF file. You should to use Windows System Image Manager to create the XML file. To use this XML file - copy it to c:windowssystem32syspr
Backups of the full system including all critical volumes (volumes that contain operating system state).
A WDDM driver for the graphics card and a Windows Experience index of 3.0 or greater.
IPV4 and IPV6
39. What are WIM files used for?
The import and export affects the entire policy. For example - if you export a policy - all of the rules from all of the rule collections are exported - including the enforcement settings for the rule collections. If you import a policy - the existin
Run slmgr.vbs -ato and then open up 3389 on windows firewall using netsh.
Installing and imaging on hardware agnostic systems as long as the processor architecture is the same (32 or 64 bit)
Use the Import Foreign Disk option on the target computer
40. What is NAP's security health validator?
It designates an authoritative DNS server - not the soa record.
WPA-Enterprise (radius authentication)
Only a local administrator
It can be configured to to state the minimum level of system health. Example: To require or not require anitvirus - antipiracy - or firewall to connect to the network.
41. You cannot delete an individual restore point - but you can either delete all restore points or all but the most recent restore point. Deleting restore points temporarily frees up disk space. As new restore points are created - disk space will be use
A stability index rating and specific event information. Data is propagated 24 hours after system installation.
Take the ip address and use the AND command on the calculator to AND the ip address and the subnet. NOTE: AND each octet separately. Then AND the gateway and the subnet. If the AND results are the same you are on the same subnet.
Run Disk Cleanup and click Clean up system files. If you are prompted for an administrator password or confirmation - type the password or provide confirmation. Click the More Options tab - under System Restore and Shadow Copies - click Clean up. In
Issue a recovery agent certificate to a user and then import that certificate into a GPO that applies to the computer where that user will be allowed to recover any EFS encrypted files. EFS Data recovery agents are optional
42. In case the _______________ - DHCP clients can be configured with an alternative static ip address?
3389
DHCP server cannot assign an ip address
At the volume level - not the drive level.
IN the WindowsUpdateClient log in the system log portion of event viewer.
43. What is Reliability Monitor display?
Each of the rule types. For example - the default rules for Executables are: Allow members of the local Administrators group to run all applications - Allow members of the Everyone group to run applications that are located in the Windows folder - Al
A stability index rating and specific event information. Data is propagated 24 hours after system installation.
1723
Through Group Policy at Computer configuration | Administrative Templates | Network | Offline Files | Enable Transparent Caching.
44. What does Microsoft Transform files (MST) do?
Modifies the installation of a Windows Installer Package (.MSI) and can be invoked with MSIEXEC.EXE
8 (bits 57 - 64) /64 Allows for 256 subnets in each site.
Use the Programs and Features Control Panel applet to
At the volume level - not the drive level.
45. What does windows cardspace do?
By using the DISM command with a /Set-Edition option: Example: DISM /IMAGE:C:SAMPLE.WIM /Set-Edition:Ultimate
Run slmgr.vbs -ato and then open up 3389 on windows firewall using netsh.
It backs up digitally identities to a password protected file.
Use AD integrated zones so the clients can update to more than one DNS server.
46. What versions of Windows 7 support Bitlocker Drive Encryption?
Install and run many Windows XP productivity applications directly from your Windows 7-based PC. It utilizes virtualization technology - such as Windows Virtual PC - to provide a virtual Windows XP Professional SP3 environment for Windows 7 so that o
Enterprise and Ultimate versions. The limitation refers only to the ability to enable protection on a removable storage device. Once BitLocker To Go is added to a storage device - that device can be used normally with any version of Windows 7. It can
A suite of tools that allow administrators to understand - control - and manage the quantity and types of data stored on the servers.
RRAS-VPN/Dialup - Wireless Access Points - Terminal Server Gateway - DHCP - and IPSEC(HRA).
47. What is DISM.EXE?
The Deployment Image Servicing and Management (DISM) tool replaces the pkgmgr - PEImg - and IntlConfg tools that are being retired in Windows 7. DISM provides a single centralized tool for performing all of the functions of these three tools in a mor
Where you go to manage your documents - music - pictures - and other files. You can browse your files the same way you would in a folder - or you can view your files arranged by properties like date - type - and author. In some ways - a library is si
WPA-Personal (uses a preshared key)
It backs up digitally identities to a password protected file.
48. What are the minimum hardware requirements for Windows 7?
Use the "Connect to a Workplace" option
1 gigahertz (GHz) or faster 32-bit (x86) or 64-bit (x64) processor - 1 gigabyte (GB) RAM (32-bit) or 2 GB RAM (64-bit) - 16 GB available hard disk space (32-bit) or 20 GB (64-bit) - DirectX 9 graphics device with WDDM 1.0 or higher driver
Specify this file with both the ScanState and LoadState commands to migrate user folders - files - and file types to computers running Windows Vista or Windows 7.
It can be configured to to state the minimum level of system health. Example: To require or not require anitvirus - antipiracy - or firewall to connect to the network.
49. What are network monitor aliases used for?
Windows XP and Server 2003.
They are in the first 48 bits /48
To display friendly labels to capture packet address headers.
Contains a list of dynamically updated list of authorities for the zone.
50. What is the name of the folder that stores all the system backup images?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183